System and method for verifying the integrity and...

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C707S793000, C713S178000, C715S255000, C715S272000

Reexamination Certificate

active

07606795

ABSTRACT:
A correctness verification system receives a query, executes the query using a query logic, and produces a query result. The query result comprises data records that satisfy the query, data verification objects associated with the data records, index segments accessed during the execution of the query, index verification objects associated with the index segments, and the query. The system transfers the query result to a verification system. The verification system verifies correctness of the query result by executing the query using the query logic. The verification system uses the data verification objects to verify integrity of the data objects, uses the index verification objects to verify the integrity of the index segments, and uses the index verification objects and the data verification objects to verify the completeness of the query result.

REFERENCES:
patent: 5136647 (1992-08-01), Haber et al.
patent: 6021491 (2000-02-01), Renaud
patent: 6976165 (2005-12-01), Carpentier et al.
patent: 7096493 (2006-08-01), Liu
patent: 2004/0039917 (2004-02-01), Ross
patent: 2005/0273592 (2005-12-01), Pryor et al.
patent: 2006/0112096 (2006-05-01), Ahluwalia et al.
patent: 2006/0206669 (2006-09-01), Zhu et al.
patent: 2006/0248052 (2006-11-01), Zurek
patent: 2006/0259459 (2006-11-01), Wu et al.
patent: 2007/0028307 (2007-02-01), Murison et al.
Verifying Completeness of Relational Query Results in Data Publishing, SIGMOD Jun. 14-15, 2006, Pang et al.
Verified query results from hybrid authentication tress, Glen et al, Data and application security 2005, LNCS 3654, pp. 84-98, 2005.
Authenticating query results in edge computing, Pang et al, proceedings of the 20th international conference on data engineering (ICDE'04).
An approach to ensure integrity of outsourced databases using signature aggregation and chaining, Narasimha et al, school of information and computer science, University of California (2005).
Authentic third-party data publication, Devanbu et al, department of computer science, University of California (1999).
Stein, C.A. et al., “Unifying File System Protection”, Jun. 2000, Proceedings of the 2001 USENIX Annual Technical Conference, pp. 79-90.
Ashar, S.M. et al., “Message Encryption With Image Processing”, Dec. 2003, Proceedings INMIC 2003, 7th International Multi-Topic Conference, pp. 7-15.
Mahimkar, A. et al., “SECUREDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks”, Dec. 2004, Globecom '04 IEEE Global Telecommunications Conference, vol. 4, pp. 2175-2179.
Liophanich, C., “An Automatic E-Evidence Archival System”, Aug. 2005, 2005, 3rd IEEE International Conference on Industrial Informatics (INDIN), pp. 209-214.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for verifying the integrity and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for verifying the integrity and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for verifying the integrity and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4120878

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.